Overview
overview
10Static
static
10KeyGen/KeyGen.exe
windows7-x64
1KeyGen/KeyGen.exe
windows10-2004-x64
1Setup.exe
windows7-x64
3Setup.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AKV.exe
windows7-x64
1AKV.exe
windows10-2004-x64
1IWM.dll
windows7-x64
3IWM.dll
windows10-2004-x64
3IWM.exe
windows7-x64
6IWM.exe
windows10-2004-x64
6IWM.dll
windows7-x64
1IWM.dll
windows10-2004-x64
1IWM.dll
windows7-x64
1IWM.dll
windows10-2004-x64
1IWM.chm
windows7-x64
1IWM.chm
windows10-2004-x64
1IWM.exe
windows7-x64
6IWM.exe
windows10-2004-x64
6Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7qs.html
windows7-x64
1qs.html
windows10-2004-x64
1安装说明.url
windows7-x64
1安装说明.url
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 06:18
Behavioral task
behavioral1
Sample
KeyGen/KeyGen.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
KeyGen/KeyGen.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
AKV.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
AKV.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
IWM.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
IWM.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
IWM.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
IWM.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
IWM.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
IWM.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
IWM.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
IWM.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
IWM.chm
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
IWM.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
IWM.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
IWM.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
qs.html
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
qs.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
安装说明.url
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
安装说明.url
Resource
win10v2004-20240611-en
General
-
Target
IWM.dll
-
Size
4KB
-
MD5
2bbb6ffc878515a79478917c5af03a9c
-
SHA1
52532ea393f3a623c05b2cd72a205da41f152c29
-
SHA256
23c8cc69783ab663e036fb0d15c01b3863ff898d5534fa1d02f16c291863f3a5
-
SHA512
be8846674af43f20501e6fe59fbd369d7393e79970ab1a4fc7c516c491939f575c5e07a1cd284287e8663d1ca2f4e6663839a79f798a7453ecd30bb0fbdcc464
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1604 1844 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 2244 wrote to memory of 1844 2244 rundll32.exe 28 PID 1844 wrote to memory of 1604 1844 rundll32.exe 29 PID 1844 wrote to memory of 1604 1844 rundll32.exe 29 PID 1844 wrote to memory of 1604 1844 rundll32.exe 29 PID 1844 wrote to memory of 1604 1844 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IWM.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IWM.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 2243⤵
- Program crash
PID:1604
-
-